204 – Insufficient data authenticity validation
Description
The application does not control on the server if someone have permission to modify certain fields and allows to use invalid data in some fields, for example non-existing names.
Impact
Inject potentially malicious characters into application fields.
Recommendation
Validate on the server side the types of data that are entered into different types of fields in the application.
Threat
Authorized user from Internet.
Expected Remediation Time
Score 4.0
Default score using CVSS 4.0. It may change depending on the context of the src.
Base 4.0
- Attack vector: N
- Attack complexity: L
- Attack Requirements: N
- Privileges required: L
- User interaction: N
- Confidentiality (VC): N
- Integrity (VI): L
- Availability (VA): N
- Confidentiality (SC): N
- Integrity (SI): N
- Availability (SA): N
Threat 4.0
- Exploit maturity: P